Debian Package Tracker
Register | Log in
Subscribe

poppler

Choose email to subscribe with

general
  • source: poppler (main)
  • version: 22.02.0-3
  • maintainer: Debian freedesktop.org maintainers (archive) (DMD)
  • uploaders: Loic Minier [DMD] – Emilio Pozuelo Monfort [DMD] – Pino Toscano [DMD]
  • arch: all any
  • std-ver: 4.6.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 0.48.0-2+deb9u2
  • o-o-sec: 0.48.0-2+deb9u4
  • oldstable: 0.71.0-5
  • stable: 20.09.0-3.1
  • testing: 22.02.0-3
  • unstable: 22.02.0-3
  • exp: 22.08.0-1
versioned links
  • 0.48.0-2+deb9u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.48.0-2+deb9u4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.71.0-5: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 20.09.0-3.1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 22.02.0-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 22.08.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • gir1.2-poppler-0.18
  • libpoppler-cpp-dev
  • libpoppler-cpp0v5
  • libpoppler-dev
  • libpoppler-glib-dev
  • libpoppler-glib-doc
  • libpoppler-glib8 (4 bugs: 2, 2, 0, 0)
  • libpoppler-private-dev (1 bugs: 0, 0, 1, 0)
  • libpoppler-qt5-1
  • libpoppler-qt5-dev
  • libpoppler118 (1 bugs: 0, 0, 1, 0)
  • poppler-utils (48 bugs: 0, 30, 18, 0)
action needed
A new upstream version is available: 22.08.0 high
A new upstream version 22.08.0 is available, you should consider packaging it.
Created: 2020-10-05 Last update: 2022-08-11 23:34
3 security issues in sid high

There are 3 open security issues in sid.

3 important issues:
  • CVE-2019-9543: An issue was discovered in Poppler 0.74.0. A recursive function call, in JBIG2Stream::readGenericBitmap() located in JBIG2Stream.cc, can be triggered by sending a crafted pdf file to (for example) the pdfseparate binary. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact. This is related to JArithmeticDecoder::decodeBit.
  • CVE-2019-9545: An issue was discovered in Poppler 0.74.0. A recursive function call, in JBIG2Stream::readTextRegion() located in JBIG2Stream.cc, can be triggered by sending a crafted pdf file to (for example) the pdfimages binary. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact. This is related to JBIG2Bitmap::clearToZero.
  • CVE-2022-27337: A logic error in the Hints::Hints function of Poppler v22.03.0 allows attackers to cause a Denial of Service (DoS) via a crafted PDF file.
Created: 2022-07-04 Last update: 2022-08-01 13:40
3 security issues in bookworm high

There are 3 open security issues in bookworm.

3 important issues:
  • CVE-2019-9543: An issue was discovered in Poppler 0.74.0. A recursive function call, in JBIG2Stream::readGenericBitmap() located in JBIG2Stream.cc, can be triggered by sending a crafted pdf file to (for example) the pdfseparate binary. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact. This is related to JArithmeticDecoder::decodeBit.
  • CVE-2019-9545: An issue was discovered in Poppler 0.74.0. A recursive function call, in JBIG2Stream::readTextRegion() located in JBIG2Stream.cc, can be triggered by sending a crafted pdf file to (for example) the pdfimages binary. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact. This is related to JBIG2Bitmap::clearToZero.
  • CVE-2022-27337: A logic error in the Hints::Hints function of Poppler v22.03.0 allows attackers to cause a Denial of Service (DoS) via a crafted PDF file.
Created: 2022-07-04 Last update: 2022-08-01 13:40
lintian reports 1 error and 12 warnings high
Lintian reports 1 error and 12 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2020-09-21 Last update: 2022-07-30 12:16
18 bugs tagged patch in the BTS normal
The BTS contains patches fixing 18 bugs (19 if counting merged bugs), consider including or untagging them.
Created: 2022-07-27 Last update: 2022-08-12 03:02
Multiarch hinter reports 1 issue(s) low
There are issues with the multiarch metadata for this package.
  • libpoppler-glib-doc could be marked Multi-Arch: foreign
Created: 2017-12-07 Last update: 2022-08-12 01:36
3 low-priority security issues in bullseye low

There are 3 open security issues in bullseye.

1 issue left for the package maintainer to handle:
  • CVE-2022-27337: (needs triaging) A logic error in the Hints::Hints function of Poppler v22.03.0 allows attackers to cause a Denial of Service (DoS) via a crafted PDF file.

You can find information about how to handle this issue in the security team's documentation.

2 ignored issues:
  • CVE-2019-9543: An issue was discovered in Poppler 0.74.0. A recursive function call, in JBIG2Stream::readGenericBitmap() located in JBIG2Stream.cc, can be triggered by sending a crafted pdf file to (for example) the pdfseparate binary. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact. This is related to JArithmeticDecoder::decodeBit.
  • CVE-2019-9545: An issue was discovered in Poppler 0.74.0. A recursive function call, in JBIG2Stream::readTextRegion() located in JBIG2Stream.cc, can be triggered by sending a crafted pdf file to (for example) the pdfimages binary. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact. This is related to JBIG2Bitmap::clearToZero.
Created: 2022-07-04 Last update: 2022-08-01 13:40
Build log checks report 3 warnings low
Build log checks report 3 warnings
Created: 2017-10-26 Last update: 2021-01-21 22:05
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.1 instead of 4.6.0).
Created: 2022-05-11 Last update: 2022-05-11 23:24
testing migrations
  • This package will soon be part of the auto-poppler transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
news
[rss feed]
  • [2022-08-10] Accepted poppler 22.08.0-1 (source amd64 all) into experimental, experimental (Debian FTP Masters) (signed by: Jeremy Bicha)
  • [2022-06-14] Accepted poppler 22.06.0-1 (source amd64 all) into experimental, experimental (Debian FTP Masters) (signed by: Sebastien Bacher)
  • [2022-03-20] poppler 22.02.0-3 MIGRATED to testing (Debian testing watch)
  • [2022-03-17] Accepted poppler 22.02.0-3 (source) into unstable (Jeremy Bicha)
  • [2022-02-07] Accepted poppler 22.02.0-2 (source) into experimental (Jeremy Bicha)
  • [2022-02-05] Accepted poppler 22.02.0-1 (source amd64 all) into experimental, experimental (Debian FTP Masters) (signed by: Jeremy Bicha)
  • [2021-11-06] Accepted poppler 21.11.0-1 (source amd64 all) into experimental, experimental (Debian FTP Masters) (signed by: Sebastien Bacher)
  • [2021-06-21] Accepted poppler 21.06.1-1 (source) into experimental (Sebastien Bacher)
  • [2021-06-11] Accepted poppler 21.06.0-1 (source amd64 all) into experimental, experimental (Debian FTP Masters) (signed by: Sebastien Bacher)
  • [2021-02-27] Accepted poppler 21.02.0-1 (source amd64 all) into experimental, experimental (Debian FTP Masters) (signed by: Sebastien Bacher)
  • [2021-01-24] poppler 20.09.0-3.1 MIGRATED to testing (Debian testing watch)
  • [2021-01-21] Accepted poppler 20.09.0-3.1 (source) into unstable (Sebastien Bacher)
  • [2020-11-08] Accepted poppler 0.48.0-2+deb9u4 (source) into oldstable (Markus Koschany)
  • [2020-11-07] poppler 20.09.0-3 MIGRATED to testing (Debian testing watch)
  • [2020-11-03] Accepted poppler 20.09.0-3 (source) into unstable (Emilio Pozuelo Monfort)
  • [2020-09-07] poppler 20.09.0-2 MIGRATED to testing (Debian testing watch)
  • [2020-09-03] Accepted poppler 20.09.0-2 (source) into unstable (Emilio Pozuelo Monfort)
  • [2020-09-03] Accepted poppler 20.09.0-1 (source) into unstable (Emilio Pozuelo Monfort)
  • [2020-09-02] Accepted poppler 20.08.0-1 (source amd64 all) into experimental, experimental (Debian FTP Masters) (signed by: Emilio Pozuelo Monfort)
  • [2020-08-20] poppler 0.85.0-2 MIGRATED to testing (Debian testing watch)
  • [2020-08-20] poppler 0.85.0-2 MIGRATED to testing (Debian testing watch)
  • [2020-08-18] Accepted poppler 0.85.0-2 (source) into unstable (Emilio Pozuelo Monfort)
  • [2020-07-23] Accepted poppler 0.48.0-2+deb9u3 (source) into oldstable (Emilio Pozuelo Monfort)
  • [2020-02-21] Accepted poppler 0.85.0-1 (source amd64 all) into experimental, experimental (Emilio Pozuelo Monfort)
  • [2019-10-18] Accepted poppler 0.26.5-2+deb8u13 (source amd64 all) into oldoldstable (Brian May)
  • [2019-10-17] Accepted poppler 0.26.5-2+deb8u12 (source amd64 all) into oldoldstable (Brian May)
  • [2019-10-12] Accepted poppler 0.81.0-1 (source amd64 all) into experimental, experimental (Emilio Pozuelo Monfort)
  • [2019-10-06] poppler 0.71.0-6 MIGRATED to testing (Debian testing watch)
  • [2019-10-04] Accepted poppler 0.71.0-6 (source) into unstable (Emilio Pozuelo Monfort)
  • [2019-09-30] Accepted poppler 0.26.5-2+deb8u11 (source amd64 all) into oldoldstable (Thorsten Alteholz)
  • 1
  • 2
bugs [bug history graph]
  • all: 127 134
  • RC: 1 2
  • I&N: 89 94
  • M&W: 37 38
  • F&P: 0
  • patch: 18 19
links
  • homepage
  • lintian (1, 12)
  • buildd: logs, exp, checks, clang, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 22.06.0-1
  • 99 bugs (5 patches)

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing